Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key

被引:0
作者
Liu, Yamin [1 ]
Li, Bao [1 ]
Lu, Xianhui [1 ]
Jia, Dingding [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
来源
INFORMATION SECURITY AND PRIVACY | 2011年 / 6812卷
关键词
computational Diffie-Hellman; twin Diffie-Hellman; key encapsulation mechanism; standard model; COMPUTATIONAL DIFFIE-HELLMAN; ENCRYPTION; ATTACK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we construct an efficient CCA-secure key encapsulation scheme in the standard model. The new scheme is based on the computational Diffie-Hellman assumption and the twinning technique; which has been widely discussed in recent years. Compared with previous schemes of the same kind, the new scheme is more generic, and offers a simple approach for reconciling ciphertext length and key size by altering a parameter. Choosing a reasonable value for the parameter, a balance between the ciphertext length and key size could be achieved.
引用
收藏
页码:310 / 318
页数:9
相关论文
共 42 条
[21]   CCA2 secure biometric identity based encryption with constant-size ciphertext [J].
Yang Yang ;
Yu-pu Hu ;
Le-you Zhang ;
Chun-hui Sun .
Journal of Zhejiang University SCIENCE C, 2011, 12 :819-827
[22]   CCA2 secure biometric identity based encryption with constant-size ciphertext [J].
Yang, Yang ;
Hu, Yu-pu ;
Zhang, Le-you ;
Sun, Chun-hui .
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 12 (10) :819-827
[23]   Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext [J].
Liqing Chen ;
Jiguo Li ;
Yichen Zhang .
Soft Computing, 2020, 24 :4589-4606
[24]   Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext [J].
Chen, Liqing ;
Li, Jiguo ;
Zhang, Yichen .
SOFT COMPUTING, 2020, 24 (06) :4589-4606
[25]   Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption [J].
Sun, Shi-Feng ;
Gu, Dawu ;
Liu, Joseph K. ;
Parampalli, Udaya ;
Yuen, Tsz Hon .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :901-906
[26]   An efficient IND-CCA2 secure Paillier-based cryptosystem [J].
Das, Angsuman ;
Adhikari, Avishek .
INFORMATION PROCESSING LETTERS, 2012, 112 (22) :885-888
[27]   IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper) [J].
Xue, Haiyang ;
Li, Bao ;
Lu, Xianhui .
ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 :231-241
[28]   Direct chosen-ciphertext secure identity-based key encapsulation without random oracles [J].
Kiltz, Eike ;
Galindo, David .
THEORETICAL COMPUTER SCIENCE, 2009, 410 (47-49) :5093-5111
[29]   A continuous leakage-resilient CCA secure identity-based key encapsulation mechanism in the standard model [J].
Qiao, Zirui ;
Zhu, Yasi ;
Zhou, Yanwei ;
Yang, Bo .
JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 162
[30]   Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism [J].
Seyhan, Kuebra ;
Akleylek, Sedat .
PEERJ COMPUTER SCIENCE, 2023, 9